[Pearg] ***UNCHECKED*** Asymmetrical communication endpoints (ACE) to ultimately enhance data privacy and data security of enduser computers
Heinrich Feuerbach <info@feuerbach.info> Fri, 05 June 2020 16:54 UTC
Return-Path: <info@feuerbach.info>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 855693A08FC for <pearg@ietfa.amsl.com>; Fri, 5 Jun 2020 09:54:29 -0700 (PDT)
X-Quarantine-ID: <erZZxmC8Y3hr>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BANNED, message contains application/pgp-encrypted,.pgp,.pgp.asc,AD72F782.asc,UNDECIPHERABLE
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level:
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id erZZxmC8Y3hr for <pearg@ietfa.amsl.com>; Fri, 5 Jun 2020 09:54:27 -0700 (PDT)
Received: from rsi20.gerwanserver.de (rsi20.gerwanserver.de [IPv6:2a02:2260:2::5bdc:227f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D153A3A090A for <pearg@irtf.org>; Fri, 5 Jun 2020 09:54:26 -0700 (PDT)
Received: from RR (83.5.154.60.ipv4.supernova.orange.pl [83.5.154.60]) by rsi20.gerwanserver.de (Postfix) with ESMTPSA id AB39859E117 for <pearg@irtf.org>; Fri, 5 Jun 2020 18:54:23 +0200 (CEST)
Date: Fri, 05 Jun 2020 18:48:33 +0200
From: Heinrich Feuerbach <info@feuerbach.info>
To: "pearg@irtf.org" <pearg@irtf.org>
Message-ID: <20200605184833.3d8dbe74@RR>
Organization: Feuerbach-Informatik
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha1"; boundary="Sig_/BNy1VV/6RNwuLjqIX3I9vDI"; protocol="application/pgp-signature"
X-PPP-Message-ID: <159137606402.23791.4810309311367625120@rsi20.gerwanserver.de>
X-PPP-Vhost: feuerbach.info
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/-bj8vlt-IcKUJI3y1HfmJBulRXg>
Subject: [Pearg] ***UNCHECKED*** Asymmetrical communication endpoints (ACE) to ultimately enhance data privacy and data security of enduser computers
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2020 16:54:30 -0000
Dear members of the pearg mailing list, today I would like to introduce you to an invention I made to guarantee in a physical manner the privacy of data of endpoints like PCs and Laptops and other computers used for communication via the internet. The physical way to ensure privacy is by asymmetry between "sending" and "receiving" to and from the networks like the internet, so to separate in, but have co-working systems for sending and receiving instead of just one system for both sending and receiving. Asymmetria in this sense is not as often used for describing different speeds for download and upload. Following this asymmetry, these advantages can be reached regarding the privacy and data security, to name just a few: - the sender part of the system and its data is immune to any hacker attacks, as not being reachable via the network (just sending, not receiving anything) - the receiver may further receive like in symmetrical communicating systems malware etc., however, the malware can't send anything back into the network like the internet. Therefore, any espionage on the data hosted on the receiver can't be successful. As well, spreading of infections from one computer to another is not longer possible then. - as data is held on both systems, sender and receiver in parallel, any ransomware-like attack can be fixed easily. To make use of these big advantages (and many more), it is needed, beneath other issues, to solve the protocol gap problem in asymmetrical systems. I solved these issues already and put beneath the theory also a working proof of concept onto my website for download and evaluation: https://firewalls.feuerbach.info File: AKE_PoC.tar.gz Source code is as well in the gzipped tarball. The tarball is electronically signed by me. You may use and redistribute the tarball. Please check the README.odt inside the tarball as well for any productive/commercial usage. Thank you for your time. Heinrich Feuerbach
- [Pearg] ***UNCHECKED*** Asymmetrical communicatio… Heinrich Feuerbach